Match Document Document Title
9141822 Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method  
A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific...
9043595 Selective shredding in a deduplication system  
Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
9043588 Method and apparatus for accelerating connections in a cloud network  
Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission...
9038170 Logging access system events  
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the...
9038191 Method and apparatus for providing DRM service  
Methods and apparatus are provided for providing a DRM service by a user terminal apparatus consuming DRM content in a service environment that provides the DRM content using a plurality of...
9032542 System and method for creating conditional immutable objects in a storage device  
A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9020890 Smart archiving and data previewing for mobile devices  
Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native...
9021258 Method and device for transcoding during an encryption-based access check on a database  
A device for transcoding during an encryption-based access check of a client device to a databank, which provides a data set in an encrypted area, has: a unit for assigning a specific access level...
9021260 Malware data item analysis  
Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware...
9021545 Method and system to secure a computing device  
In one embodiment, a first instruction prescribing a setting for a feature is defined. A second instruction prescribing a first action is defined. A third instruction prescribing a second action...
9021259 Encrypted database system, client terminal, encrypted database server, natural joining method, and program  
A client terminal is provided with a column encryption unit that, from an encryption key, a table identifier, and a column identifier, generates a column private key, a column public key, and a...
9021593 XSS detection method and device  
The present invention discloses a XSS detection method for detecting the XSS vulnerabilities in a web page, comprising for each parameter-value pair in a set of parameter-value pairs that can be...
9014372 Video file encryption and decryption method, device, and mobile terminal  
This discloses a video file encryption and decryption method, device, and mobile terminal. The encryption method can include: obtaining a to-be-encrypted video file and an encryption key,...
9015797 System and method of isolation of resources using resource manager  
Methods, systems, and computer program are provided for managing access to computer resources by receiving a request, from a client, for performing one or more operations on a computer resource;...
9015858 Graphical user interface for seamless secure private collaboration  
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored...
9015844 Techniques for web application vulnerability scanning  
Techniques for web application vulnerability scanning are disclosed. In one particular embodiment, the techniques may be realized as a method for web application vulnerability scanning comprising...
9015472 Marking electronic messages to indicate human origination  
Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message...
9015791 Method of managing web application policy using smart card, and web server and mobile terminal for implementing the same  
A method of managing policy information in a mobile terminal by requesting an external policy management server for information about whether a change has been made to policy information and...
9015826 Mobile platform security apparatus and method  
A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third...
RE45473 Copy protection using detailed copy control information  
Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified...
9009470 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
 
A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific...
9009471 System and method for multi-layered sensitive data protection in a virtual computing environment  
Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine...
9009469 Systems and methods for securing data in a cloud computing environment using in-memory techniques and secret key encryption  
In one embodiment, a computer-implemented method comprises determining, by a controller, whether a first data store is in an initialization mode. The first data store stores client data. A second...
9003183 Virtual storage system and file encryption methods  
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic documents to be uploaded into a...
9003184 Computing device and method for protecting software of the computing device  
In a method for protecting software of a computing device, a hypertext preprocessor (PHP) software program of the computing device is encrypted using an encryption rule to obtain an encrypted...
9003517 Isolation and presentation of untrusted data  
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in...
8996884 High privacy of file synchronization with sharing functionality  
Systems and methods for providing privacy of file synchronization with sharing functionality are presented. In embodiments, a file synchronization system comprises one or more folders associated...
8997185 Encryption sentinel system and method  
An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server...
8994978 Image processing apparatus that facilitates printing of password-protected documents, and corresponding method for forming images  
An image forming apparatus performs a direct printing function. A selecting section selects at least two files from a plurality of files stored in at least one of an internal storage medium and an...
8996872 Contactless seed programming method and system thereof  
The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains...
8989388 Distribution of storage area network encryption keys across data centers  
Efficient mechanisms are provided for transferring key objects associated with disk logical unit numbers and tape cartridges from one data center to another data center. A request is received to...
8990559 Automating the creation and maintenance of policy compliant environments  
Embodiments of the present invention provide for a method, system, and apparatus for creating a policy compliant environment on a computer. In an embodiment of the invention, an encrypted file can...
8990585 Time based dispersed storage access  
A method begins with a processing module receiving a data retrieval request and obtaining a real-time indicator corresponding to when the data retrieval request was received. The method continues...
8990588 Storage system, storage control apparatus, and storage control method  
A storage system in which a storage control apparatus writes data in each of divided areas defined by division of one or more storage areas in one or more storage devices, after encryption of the...
8990882 Pre-calculating and updating data loss prevention (DLP) policies prior to distribution of sensitive information  
A method and apparatus submitting information to be protected before permitting an outbound data transfer with the information is described. A DLP agent, incorporating a DLP submission tool,...
8990558 Securing information in a cloud computing system  
The method and system for secure data (information) inside a cloud computing system, allow data to be encrypted everywhere in the cloud on storage devices and in communication lines so that only...
8990954 Distributed lock manager for file system objects in a shared file system  
A method and apparatus are provided for mediating access to a shared object in a naive computer system having a shared-nothing operating system layered on a shared file system. At least one...
8990921 Apparatus for processing with a secure system manager  
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of non-secure executable instructions on...
8984629 Apparatus and method for preemptively protecting against malicious code by selective virtualization  
In an apparatus and method for protecting resources of a computing system from a malicious code by selective virtualization, at least a part of the resources is classified as compulsory resources...
8984652 Transfer of digital rights management information  
A device including a communication interface and processing logic is provided. The communication interface may receive digital rights management security information and content from a source...
8983074 Input content data managing system and method of managing input content data  
An input content data managing system, includes a first electronic storing apparatus that stores encoded content data generated by encoding content data with a cryptographic key; a electronic...
8978108 Method, device, and system for service presentation  
A method, device and system for service presentation, which includes: receiving a presentation request message; acquiring presentation information from the presentation request message; storing...
8977866 Security mechanism for increased personal data protection  
Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include apparatus and methods to manage...
8977756 SWAN: achieving high utilization in networks  
Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer...
8978140 System and method of analyzing web content  
A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web content are accessed by workstations and...
8978104 Access control center workflow and approval  
Methods and systems are disclosed for providing indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing an access control...
8972723 Storage device and method for providing a partially-encrypted content file to a host device  
A storage device and method for providing a partially-encrypted content file to a host device are provided. In one embodiment, the storage device retrieves a content file from memory in the...
8973142 Compromised insider honey pots using reverse honey tokens  
According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain unauthorized access to enterprise data provided...
8972724 Digital content management system, digital watermark embedding device, digital watermark detection device, program, and digital content management method  
A digital content management system (1) includes a digital watermark embedding device (100) which generates a file having a file name used as a digital watermark, and embeds it into a digital...